Sciweavers

45 search results - page 8 / 9
» P Systems with Active Membranes Characterize PSPACE
Sort
View
ERSHOV
2006
Springer
13 years 10 months ago
Information-Flow Attacks Based on Limited Observations
Abstract. Two formal models for description of timing attacks are presented, studied and compared with other security concepts. The models are based on a timed process algebra and ...
Damas P. Gruska
BMCBI
2010
133views more  BMCBI 2010»
13 years 6 months ago
Stability analysis of the GAL regulatory network in Saccharomyces cerevisiae and Kluyveromyces lactis
Background: In the yeast Saccharomyces cerevisiae, interactions between galactose, Gal3p, Gal80p, and Gal4p determine the transcriptional status of the genes required for the gala...
Vishwesh V. Kulkarni, Venkatesh Kareenhalli, Pushk...
KDD
2009
ACM
248views Data Mining» more  KDD 2009»
13 years 11 months ago
PSkip: estimating relevance ranking quality from web search clickthrough data
1 In this article, we report our efforts in mining the information encoded as clickthrough data in the server logs to evaluate and monitor the relevance ranking quality of a commer...
Kuansan Wang, Toby Walker, Zijian Zheng
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 5 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
IMC
2006
ACM
14 years 11 days ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie